Beyond the standards and frameworks, how do secure-by-design tenets become practical, repeatable and scalable?